Cyber-Attacks From the Political Economy Perspective and Turkey

Cyber-Attacks From the Political Economy Perspective and Turkey

Serpil Karlidag (Giresun University, Turkey) and Selda Bulut (Ankara Haci Bayram Veli University, Turkey)
DOI: 10.4018/978-1-7998-3270-6.ch017
OnDemand PDF Download:
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Since cyber-attacks involve a wide range of actions, they are subject to various definitions and classification. As some of the attacks cover stealing data and information, some of them prevent the whole system from working. Some attacks are connected to political conflicts while others are caused by economic or social tensions. Due to the developments in new communication technologies, the espionage activities which were held by the governments previously have been also occurring in civil organizations. Espionage activities for political reasons as well as economic motivations can cause big damage. The fact that individuals and organizations do not take the necessary measures makes them easily the target of these attacks. While the problem is analyzing with a holistic approach, the need to examine the relations between institutions, social relations, information and hegemony from a moral point of view due to the concentration of constantly changing and developing technology on certain hands have precisely made this article necessary to deal with a critical economic political approach.
Chapter Preview
Top

Introduction

Each field of modern life depends on computers and e-technologies. Together with rapid development of Information and Communication Technologies after 1990, and transfer of applications of both public and private sectors into electronic media have made each field of life be depended on IT. Such developments have brought forward cyber-security measures on the assumption that the cooperation between secret services, hackers and crime organisations has targeted state secrets and the information owned by private sector with relation to intellectual property rights (Başaran, 2017). As cybersecurity has started to be a vital concern for functioning of modern economy.

Cyber-attacks started to occur after 1990s have become a source of concern in terms of security and international relations, and the attention is started to be paid to the economic aspect of the case. As a matter of fact, cyberattacks have been determined in Global Risk Report of World Economic Forum as the third biggest global risk after bad weather conditions and natural disasters. The impact area of cyberattacks, carried out for different purposes and by various techniques, expands covering many countries. As institutions and governments have been digitalised and their dependence on cyberspace increases day by day, they become targets of the attacks. Such situation carries the damage of cyberattacks beyond the individuals; it constitutes a major form of threat. Malicious activities, which are a kind of cybersecurity breach, are classified as cyberattacks and data breach. According to national intelligence directors, cyberattacks mainly change the data, and include physical impacts, such as deleting and impairment, which directly interfere in the activities. Data breach, on the other hand, does not interfere in ordinary course of business, instead it discloses the corporate data to third parties that do not have the authority to see or receive such data (White House, 2018). The attacks not only abuse trust of users in internet but also damage the activities of governments and accordingly affect the economic growth in a negative manner.

Gandhi et al. (2011) have put forward that cyberattacks result in psychological effects such as rapid dispersion of fear as a form of panic, beside the direct physical effects such as paralysation of certain systems like water, electricity, drainage, energy which are considered as critical infrastructures1 and highly necessary in daily life, financial losses and prevention of access to information or disclosure of information in an unauthorised way.

Complete Chapter List

Search this Book:
Reset